US8364807B1 - Identifying and controlling network sessions via an access concentration point - Google Patents

Identifying and controlling network sessions via an access concentration point Download PDF

Info

Publication number
US8364807B1
US8364807B1 US10/991,791 US99179104A US8364807B1 US 8364807 B1 US8364807 B1 US 8364807B1 US 99179104 A US99179104 A US 99179104A US 8364807 B1 US8364807 B1 US 8364807B1
Authority
US
United States
Prior art keywords
peer
access
messages
session initiation
communication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related, expires
Application number
US10/991,791
Inventor
Larry Dewayne Lewis
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
RPX Clearinghouse LLC
Original Assignee
Rockstar Consortium US LP
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Rockstar Consortium US LP filed Critical Rockstar Consortium US LP
Assigned to NORTEL NETWORKS LIMITED reassignment NORTEL NETWORKS LIMITED ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: LEWIS, LARRY DEWAYNE
Priority to US10/991,791 priority Critical patent/US8364807B1/en
Assigned to Rockstar Bidco, LP reassignment Rockstar Bidco, LP ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: NORTEL NETWORKS LIMITED
Priority to US13/370,641 priority patent/US8612587B1/en
Assigned to ROCKSTAR CONSORTIUM US LP reassignment ROCKSTAR CONSORTIUM US LP ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: Rockstar Bidco, LP
Publication of US8364807B1 publication Critical patent/US8364807B1/en
Application granted granted Critical
Priority to US14/105,639 priority patent/US20140108651A1/en
Assigned to RPX CLEARINGHOUSE LLC reassignment RPX CLEARINGHOUSE LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: BOCKSTAR TECHNOLOGIES LLC, CONSTELLATION TECHNOLOGIES LLC, MOBILESTAR TECHNOLOGIES LLC, NETSTAR TECHNOLOGIES LLC, ROCKSTAR CONSORTIUM LLC, ROCKSTAR CONSORTIUM US LP
Assigned to JPMORGAN CHASE BANK, N.A., AS COLLATERAL AGENT reassignment JPMORGAN CHASE BANK, N.A., AS COLLATERAL AGENT SECURITY AGREEMENT Assignors: RPX CLEARINGHOUSE LLC, RPX CORPORATION
Assigned to RPX CORPORATION, RPX CLEARINGHOUSE LLC reassignment RPX CORPORATION RELEASE (REEL 038041 / FRAME 0001) Assignors: JPMORGAN CHASE BANK, N.A.
Expired - Fee Related legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0876Network utilisation, e.g. volume of load or congestion level
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2854Wide area networks, e.g. public data networks
    • H04L12/2856Access arrangements, e.g. Internet access
    • H04L12/2869Operational details of access network equipments
    • H04L12/287Remote access server, e.g. BRAS
    • H04L12/2874Processing of data for distribution to the subscribers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2854Wide area networks, e.g. public data networks
    • H04L12/2856Access arrangements, e.g. Internet access
    • H04L12/2869Operational details of access network equipments
    • H04L12/2878Access multiplexer, e.g. DSLAM
    • H04L12/2887Access multiplexer, e.g. DSLAM characterised by the offered subscriber services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/02Topology update or discovery
    • H04L45/10Routing in connection-oriented networks, e.g. X.25 or ATM

Definitions

  • the present invention relates to packet-based communications, and in particular to identifying and controlling communication sessions via an access concentration point.
  • P2P peer-to-peer
  • network control entities cannot effectively detect peer-to-peer sessions or limit the resources used in supporting the peer-to-peer sessions.
  • a peer-to-peer session may use sufficient resources to negatively impact the quality of the authorized sessions since the peer-to-peer session is causing the network capacity to be exceeded.
  • the present invention facilitates identification and control of peer-to-peer sessions via an access concentration point.
  • the access concentration point is an entity at the edge of a packet network at which numerous media flows for various communication clients are concentrated. In operation, the access concentration point will monitor packets routed therethrough and detect access messages intended for known peer-to-peer access services. These access messages may take any form, including login or registration messages. The access messages are generated from a communication client and sent to the peer-to-peer access service, which will respond to the access messages by sending an access reply message back to the appropriate communication client.
  • the access concentration point will monitor the packets being routed to identify the access reply message, which will include routing addresses that may be associated with potential remote communication clients, internal routing nodes, or other entities, to which or through which peer-to-peer communication sessions may be established. Armed with these addresses, the access concentration point can further monitor packets to identify when an attempt to initiate a peer-to-peer communication session is being made to or through an entity associated with one or more of these addresses.
  • the access concentration point may take any number of actions, depending on how the access concentration point is configured. For example, these actions may include simply identifying and reporting the attempts to establish peer-to-peer communication sessions, dropping the session initiation messages to thwart establishment of peer-to-peer sessions, or rerouting the peer-to-peer communication sessions through a monitoring entity. Further, the access concentration point may be configured to actually monitor the content of peer-to-peer communication sessions that are allowed to be established. Accordingly, the access concentration points may be configured to provide efficient and effective identification and control of peer-to-peer communication sessions. As such, service providers can more efficiently control allocation and use of resources as dictated by subscriber and network policies.
  • FIG. 1 is a block representation of a communication environment according to one embodiment of the present invention.
  • FIGS. 2A-2D illustrate different scenarios in which communication sessions may be identified and controlled according to select embodiments of the present invention.
  • FIG. 3 is a communication flow diagram illustrating the process for identifying and controlling a communication session according to one embodiment of the present invention.
  • FIG. 4 is a block representation of an access concentration point according to one embodiment of the present invention.
  • the present invention facilitates identification, and optional control, of peer-to-peer (P2P) sessions.
  • P2P peer-to-peer
  • FIG. 1 an exemplary communication environment 10 is illustrated in which identification of a peer-to-peer session is possible, given the present invention.
  • a packet network 12 is used to support packet-based communications between communication clients 14 .
  • These communication clients 14 may take many forms, such as personal computers (PCs), voice-over-packet telephony terminals, personal digital assistants (PDAs), or any other type of communication device.
  • Access to the packet network 12 for the communication clients 14 may be afforded through an access point (AP) 16 and an access concentration point 18 .
  • AP access point
  • 18 access concentration point
  • the access points 16 may take any number of forms, including cable, digital subscriber line (DSL), dial-up, integrated services digital network (ISDN), or any other available modem that provides an interface between the corresponding communication client 14 and the packet network 12 .
  • the various access points 16 are connected to an access concentration point 18 , which aggregates the communication flows with each of the access points 16 to properly interface with the packet network 12 .
  • the various cable, DSL, dial-up, ISDN, or other type of communication flows are converted as necessary for delivery over the packet network 12 , and vice versa.
  • the access concentration point 18 may take many forms, but will generally reside at the edge of the packet network 12 and operate to aggregate connections with the access point 16 .
  • the packet network 12 can support peer-to-peer communication sessions between the communication clients 14 . These peer-to-peer sessions will be established through the respective access points 16 and access concentration points 18 . Further, certain peer-to-peer sessions may use designated routing nodes 20 through which the peer-to-peer communication sessions are established.
  • communication clients 14 that establish peer-to-peer communication sessions will initially interact with a peer-to-peer access service 22 with which the communication clients 14 will register, and perhaps receive routing paths and associated addresses for the communication sessions. Accordingly, participating communication clients 14 will initially register with the peer-to-peer access service 22 , and use information derived from the peer-to-peer access service 22 to establish peer-to-peer communication sessions with other communication clients 14 that are associated with the peer-to-peer access service 22 . Further details on the establishment of peer-to-peer sessions will be provided with the following examples.
  • the present invention operates to identify peer-to-peer communication sessions. Identification is provided by the access concentration points 18 .
  • the access concentration points 18 will monitor packets from the communication clients 14 to identify access messages that are intended for the peer-to-peer access service 22 . These access messages may take many forms, including those for logging in to the peer-to-peer access service 22 or for registering therewith.
  • the access concentration point 18 will capture the reply and analyze any associated routing information or addresses that may be associated with future peer-to-peer sessions involving the communication client 14 .
  • the reply may include addresses for communication clients 14 to which a peer-to-peer session may be established, as well as internal routing addresses such as those associated with the routing nodes 20 .
  • the access concentration point 18 can recognize the attempt to establish the peer-to-peer communication session and take any number of desired actions. These actions may include simply logging and reporting the fact that a peer-to-peer session was attempted, the peer-to-peer session may be thwarted by dropping the request to establish the session, the content of the peer-to-peer session may be intercepted at the access concentration point 18 , or the peer-to-peer session may be established through a monitoring entity. As illustrated in FIG. 1 , a reporting service 24 may be provided to which reporting messages are sent in association with detecting or controlling peer-to-peer communication sessions. Further, a proxy 26 is provided such that the peer-to-peer session can be established through the proxy 26 for monitoring.
  • the present invention will employ an inspection function in the access concentration point 18 to monitor packets being routed through the packet network 12 .
  • the access concentration points 18 will monitor packets to detect messages that are sent to or received from the peer-to-peer access service 22 . These messages may be generally characterized to include access messages sent to and access reply messages received from the peer-to-peer access service 22 .
  • the access messages may be any type of message intended for the peer-to-peer access service 22 , including login, registration, or other information query messages. Many of these messages will elicit a reply, which is generally referred to as an access reply message.
  • the access concentration point 18 will store addresses associated with peer-to-peer access services 22 and recognize messages sent to these addresses and received from these addresses. Further, the access concentration point 18 will keep track of those communication clients 14 that communicate with the peer-to-peer access services 22 .
  • the access concentration point 18 will detect the message and allow the message to continue on to the peer-to-peer access service 22 .
  • the peer-to-peer access service 22 When the peer-to-peer access service 22 generates an access reply message to the access message, the access reply message will traverse the access concentration point 18 , which will analyze information in the access reply message and forward the access reply message on to the local communication client 14 .
  • the information analyzed in the access reply message may include the addresses for communication clients 14 with which peer-to-peer sessions may be established, as well as addresses for defined routing entities, such as the routing nodes 20 through which a peer-to-peer session may be directed by the peer-to-peer access service 22 .
  • the access message may also be analyzed to derive the addresses or other information relative to peer-to-peer communication sessions.
  • the databases associated with tracking and controlling the peer-to-peer communication sessions may be updated in a continuous fashion based on analysis of the various access and access reply messages.
  • the access concentration points 18 also monitor the packets from all communication clients 14 or select communication clients 14 that have been identified as those participating in peer-to-peer communication sessions or interacting with the peer-to-peer access service 22 , to detect messages intended to establish peer-to-peer communication sessions. These messages are generally referred to as session initiation messages (SIMs), and may be detected as being any type of message involved in establishing a communication session from a communication client 14 to which or from which participation in peer-to-peer communication sessions is known or suspected, based on current or past information.
  • SIMs session initiation messages
  • the access concentration point 18 may detect a session initiation message from a local communication client 14 that is known to participate in peer-to-peer communication sessions; detect a session initiation message to a remote communication client 14 that is known to participate in peer-to-peer communication sessions; or detect information in the session initiation message indicating that a peer-to-peer communication session is being established through any means.
  • any number of actions may be taken alone or in combination.
  • the session initiation messages associated with P2P communications are simply dropped, such that the intended communication session is prevented.
  • the identification of a session initiation message associated with P2P communications may dictate sending a notification to a reporting service 24 to record information pertaining to the attempt to establish a P2P communication session from the local communication client 14 to the remote communication client 14 .
  • the packet carrying the session initiation message may be dropped to prevent establishment of the P2P communication session, or the session initiation message may be forwarded in traditional fashion to allow the P2P communication session to be established.
  • the inspection function may take the necessary steps to have the P2P communication session routed through a monitoring function, which may be provided by a proxy 26 .
  • a monitoring function which may be provided by a proxy 26 .
  • the communication session may be established through the proxy 26 , such that the content of the P2P communication session may be monitored with or without the knowledge of the local and remote communication clients 14 participating in the communication session.
  • FIGS. 2B-2D provide functional illustrations of how packets are inspected to identify session initiation messages associated with P2P communication sessions and the resulting processing once a SIM is identified.
  • the access concentration point 18 is used to inspect all packets routed therethrough.
  • a local communication client 14 initiates a P2P communication session by sending a SIM, such as a Session Initiation Protocol (SIP) Invite message, toward a remote communication client 14 .
  • SIM Session Initiation Protocol
  • the access concentration point 18 will identify the packet as being one representing a SIM associated with a P2P communication session.
  • the access concentration point 18 will simply drop the packet representing the SIM to prevent establishment of the desired P2P communication session between local and remote communication clients.
  • the access concentration point 18 when the access concentration point 18 identifies a packet representing a SIM associated with P2P communication session, a reporting message is sent to the reporting service 24 to provide the details associated with the SIM, and the SIM is forwarded toward remote communication client 14 such that the P2P communication session may be established and a session flow may take place between the local and remote communication clients 14 . Accordingly, the access concentration point 18 may monitor each of the packets within the session flow, as well as the session control messages used to establish the P2P communication session. Those skilled in the art will recognize that additional control messages will be used to establish the P2P communication sessions in traditional fashion. Certain or all of these control messages may represent a session initiation message.
  • the access concentration point 18 is configured to identify a SIM associated with a P2P communication session, send a corresponding reporting message to the reporting service 24 , and redirect the requested P2P communication session to be established through a proxy 26 , which will act as a monitoring device for the session initiation messages, session traffic, or a combination thereof.
  • the SIM may be forwarded to the proxy 26 , which will forward the SIM to the remote communication client 14 , wherein a communication session is established through the proxy 26 and the access concentration point 18 , such that the traffic creating the session flow in the communication session may be monitored.
  • the monitoring of the session traffic may take place at the proxy 26 , access concentration point 18 , or other monitoring entity through which the communication session is established.
  • the proxy 26 may also act as a proxy in a traditional sense for handling session control messages.
  • the session control messages may be handled by the proxy 26 , which will operate to establish the session between the local and remote communication clients 14 through an appropriate monitoring entity, which may be provided by the access concentration point 18 .
  • the criteria used to identify P2P access services 22 and participating communication clients 14 may be updated periodically as the criteria change, new P2P access services 22 and participating communication clients 14 are discovered, or old ones should be removed from being considered involved in P2P communication sessions.
  • the updating process would be analogous to updates provided on a systematic basis for antivirus applications.
  • FIG. 3 a more detailed communication flow is provided to illustrate exemplary operation of the present invention according to one embodiment.
  • a remote communication client 14 associated with User B desires to establish P2P communication sessions and wants to associate with the P2P access service 22 to facilitate such communication sessions.
  • User B will interact with the remote communication client 14 to initiate access to the P2P access service 22 (step 100 ).
  • An access message is sent to the P2P access service 22 to log into or otherwise register with the P2P access service 22 , which keeps an updated list of active or available users (step 102 ).
  • the P2P access service 22 will allow User B to log in or otherwise register, and will send an access reply message back to remote communication client 14 indicating that the login or registration process is complete (step 104 ).
  • the access reply message may include addresses of various communication clients to which P2P communication sessions may be established, routing nodes 20 , or other entities associated with supporting the P2P communication sessions.
  • a local communication client 14 will initiate interaction with the P2P access service 22 in response to instructions from User A (step 106 ). As such, the local communication client 14 will send an access message for login or registration purposes toward the P2P access service 22 (step 108 ). The access message is routed through the local communication client's access concentration point 18 , wherein the associated packet or packets are monitored (step 110 ) and routed toward the P2P access service 22 (step 112 ). The P2P access service 22 will log in or otherwise register User A and the associated local communication client 14 and send an access reply message back toward remote communication client 14 (step 114 ).
  • the access reply message is detected and monitored by the access concentration point 18 (step 116 ) and routed to the local communication client 14 (step 118 ).
  • the access concentration point 18 may obtain addresses of various communication clients to which P2P communication sessions may be established, routing nodes 20 , or other entities associated with supporting the P2P communication sessions.
  • the P2P access service 22 may operate in a fashion similar to a text messaging service by providing information alerting the active users of other active users when a new person becomes active or an active person becomes inactive. As such, the P2P access service 22 may send an update to the remote communication client 14 indicating that User A is available, and may also provide User A's address, which may be the IP address for the local communication client 14 (step 120 ). Similarly, the P2P access service 22 may send an update toward the local communication client 14 (step 122 ), wherein the update is monitored by the access concentration point 18 (step 124 ) and forwarded to the local communication client 14 (step 126 ).
  • this address information may have already been known by the P2P access service 22 and detected by the access concentration point 18 on the access reply message sent to the remote communication client 14 .
  • User A is alerted that User B is active and available for communications
  • User B is alerted that User A is active and available for communications.
  • the respective local and remote communication clients 14 know each other's addresses.
  • the local communication client 14 will send a SIM toward the remote communication client 14 (step 130 ).
  • the SIM is represented by a packet routed through the access concentration point 18 , which will monitor all of the packets routed therethrough and will detect the SIM from the local communication client 14 as being one associated with a P2P communication session, by analyzing the intended address (of the remote communication client 14 ) or other information indicative of a P2P communication session (step 132 ).
  • the access concentration point 18 may forward the SIM to the remote communication client 14 (step 134 ), as well as send a reporting message to the reporting service 24 (step 136 ).
  • the reporting message may identify the originating (local) and terminating (remote) communication clients 14 , respectively, and any other information deemed appropriate for analyzing and reporting.
  • the remote communication client 14 will respond to the SIM by sending a session response toward local communication client 14 (step 138 ).
  • the session response will pass through the access concentration point 18 where it is monitored (step 140 ), and is then forwarded to the local communication client 14 (step 142 ).
  • a session is established between the local communication client 14 and the remote communication client 14 through the access concentration point 18 , wherein the packets representing the information being transferred between local and remote communication clients 14 for the communication session are monitored (steps 144 , 146 , and 148 ).
  • the SIM will generally include the address of the originating local communication client 14 and any port and coding information for the communication session.
  • the session response may include the address of the terminating remote communication client 14 and any relevant port and coding information.
  • each of the local and remote communication clients 14 will have the necessary information to determine where and how to send packets to facilitate the P2P communication session.
  • the P2P communication session may be forced to be routed through select routing nodes 20 .
  • the access concentration point 18 may be triggered by the address of the known nodes 20 for detecting and controlling P2P communication sessions.
  • the address of these routing nodes 20 may be obtained from the communications between the communication clients 14 and the P2P access service 22 or communications with other communication clients.
  • the access concentration point 18 will include a control system 28 associated with an access network interface 30 and a core network interface 32 .
  • the access network interface 30 is the interface to which the various communication clients 14 are connected, directly or indirectly through corresponding access points 16 .
  • the core network interface 32 provides an interface to the packet network 12 .
  • the control system 28 includes a network processor (NP) 34 associated with memory 36 and a central processor (CP) 38 associated with memory 40 .
  • the network processor 34 will provide the various packet processing functions, which include packet monitoring and message and information detection as described above.
  • the central processor 38 will cooperate with the network processor 34 to provide the overall control of the access concentration point 18 .
  • Such control may include how to respond to the detection of interaction with the peer-to-peer access service 22 or an attempt to establish a peer-to-peer communication session.
  • Those skilled in the art will recognize the general operation of the central processor 38 in relation to the network processor 34 .

Abstract

The present invention facilitates identification and control of peer-to-peer sessions via an access concentration point (ACP). The ACP will monitor packets routed therethrough and detect access messages intended for known peer-to-peer access services. The access messages sent from a communication client to the peer-to-peer access service, which will respond by sending an access reply message back to the communication client. The ACP will monitor the packets being routed to identify the access reply message, which will include routing addresses that may be associated with potential remote communication clients. With these addresses, the ACP can monitor packets to identify when an attempt to initiate a peer-to-peer communication session is being made to or through an entity associated with one or more of these addresses. Upon detecting a session initiation message to or through an identified address, the ACP may take any number of actions, depending on how the ACP is configured.

Description

FIELD OF THE INVENTION
The present invention relates to packet-based communications, and in particular to identifying and controlling communication sessions via an access concentration point.
BACKGROUND OF THE INVENTION
The evolution of packet communications has led to packet networks supporting various types of media services, including data, audio, video, and voice services. These services generally require vastly different resources to support acceptable levels of quality. Further, there is a movement to control the allocation of resources to subscribers based on service agreements defining different levels of service, as well as requirements of the requested services.
Since network resources, and in particular bandwidth, are limited, there is a need to keep track of those resources that have been allocated, control the allocation of resources, and prevent unauthorized use of resources. Unfortunately, certain types of communication sessions are difficult to control and can lead to excessive use, if not unknown use, of network resources. For example, peer-to-peer (P2P) sessions between communication clients are difficult to control, since network control entities cannot effectively detect peer-to-peer sessions or limit the resources used in supporting the peer-to-peer sessions. In many instances, where authorized resources represent most if not all of the available resources in a network, a peer-to-peer session may use sufficient resources to negatively impact the quality of the authorized sessions since the peer-to-peer session is causing the network capacity to be exceeded.
As such, there is a need for an efficient and effective technique to identify and control such communication sessions according to subscriber agreements or network policies.
SUMMARY OF THE INVENTION
The present invention facilitates identification and control of peer-to-peer sessions via an access concentration point. The access concentration point is an entity at the edge of a packet network at which numerous media flows for various communication clients are concentrated. In operation, the access concentration point will monitor packets routed therethrough and detect access messages intended for known peer-to-peer access services. These access messages may take any form, including login or registration messages. The access messages are generated from a communication client and sent to the peer-to-peer access service, which will respond to the access messages by sending an access reply message back to the appropriate communication client. The access concentration point will monitor the packets being routed to identify the access reply message, which will include routing addresses that may be associated with potential remote communication clients, internal routing nodes, or other entities, to which or through which peer-to-peer communication sessions may be established. Armed with these addresses, the access concentration point can further monitor packets to identify when an attempt to initiate a peer-to-peer communication session is being made to or through an entity associated with one or more of these addresses.
Upon detecting a session initiation message to or through an identified address, the access concentration point may take any number of actions, depending on how the access concentration point is configured. For example, these actions may include simply identifying and reporting the attempts to establish peer-to-peer communication sessions, dropping the session initiation messages to thwart establishment of peer-to-peer sessions, or rerouting the peer-to-peer communication sessions through a monitoring entity. Further, the access concentration point may be configured to actually monitor the content of peer-to-peer communication sessions that are allowed to be established. Accordingly, the access concentration points may be configured to provide efficient and effective identification and control of peer-to-peer communication sessions. As such, service providers can more efficiently control allocation and use of resources as dictated by subscriber and network policies.
Those skilled in the art will appreciate the scope of the present invention and realize additional aspects thereof after reading the following detailed description of the preferred embodiments in association with the accompanying drawing figures.
BRIEF DESCRIPTION OF THE DRAWING FIGURES
The accompanying drawing figures incorporated in and forming a part of this specification illustrate several aspects of the invention, and together with the description serve to explain the principles of the invention.
FIG. 1 is a block representation of a communication environment according to one embodiment of the present invention.
FIGS. 2A-2D illustrate different scenarios in which communication sessions may be identified and controlled according to select embodiments of the present invention.
FIG. 3 is a communication flow diagram illustrating the process for identifying and controlling a communication session according to one embodiment of the present invention.
FIG. 4 is a block representation of an access concentration point according to one embodiment of the present invention.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
The embodiments set forth below represent the necessary information to enable those skilled in the art to practice the invention and illustrate the best mode of practicing the invention. Upon reading the following description in light of the accompanying drawing figures, those skilled in the art will understand the concepts of the invention and will recognize applications of these concepts not particularly addressed herein. It should be understood that these concepts and applications fall within the scope of the disclosure and the accompanying claims.
The present invention facilitates identification, and optional control, of peer-to-peer (P2P) sessions. With reference to FIG. 1, an exemplary communication environment 10 is illustrated in which identification of a peer-to-peer session is possible, given the present invention. In general, a packet network 12 is used to support packet-based communications between communication clients 14. These communication clients 14 may take many forms, such as personal computers (PCs), voice-over-packet telephony terminals, personal digital assistants (PDAs), or any other type of communication device. Access to the packet network 12 for the communication clients 14 may be afforded through an access point (AP) 16 and an access concentration point 18. The access points 16 may take any number of forms, including cable, digital subscriber line (DSL), dial-up, integrated services digital network (ISDN), or any other available modem that provides an interface between the corresponding communication client 14 and the packet network 12. Traditionally, the various access points 16 are connected to an access concentration point 18, which aggregates the communication flows with each of the access points 16 to properly interface with the packet network 12. As such, the various cable, DSL, dial-up, ISDN, or other type of communication flows are converted as necessary for delivery over the packet network 12, and vice versa. The access concentration point 18 may take many forms, but will generally reside at the edge of the packet network 12 and operate to aggregate connections with the access point 16.
As with most packet networks, the packet network 12 can support peer-to-peer communication sessions between the communication clients 14. These peer-to-peer sessions will be established through the respective access points 16 and access concentration points 18. Further, certain peer-to-peer sessions may use designated routing nodes 20 through which the peer-to-peer communication sessions are established.
Generally, communication clients 14 that establish peer-to-peer communication sessions will initially interact with a peer-to-peer access service 22 with which the communication clients 14 will register, and perhaps receive routing paths and associated addresses for the communication sessions. Accordingly, participating communication clients 14 will initially register with the peer-to-peer access service 22, and use information derived from the peer-to-peer access service 22 to establish peer-to-peer communication sessions with other communication clients 14 that are associated with the peer-to-peer access service 22. Further details on the establishment of peer-to-peer sessions will be provided with the following examples.
As noted, the present invention operates to identify peer-to-peer communication sessions. Identification is provided by the access concentration points 18. In operation, the access concentration points 18 will monitor packets from the communication clients 14 to identify access messages that are intended for the peer-to-peer access service 22. These access messages may take many forms, including those for logging in to the peer-to-peer access service 22 or for registering therewith. When the peer-to-peer access service 22 replies, the access concentration point 18 will capture the reply and analyze any associated routing information or addresses that may be associated with future peer-to-peer sessions involving the communication client 14. The reply may include addresses for communication clients 14 to which a peer-to-peer session may be established, as well as internal routing addresses such as those associated with the routing nodes 20. When the communication client 14 attempts to establish a peer-to-peer session with one of the communication clients 14 associated with one of these addresses, the access concentration point 18 can recognize the attempt to establish the peer-to-peer communication session and take any number of desired actions. These actions may include simply logging and reporting the fact that a peer-to-peer session was attempted, the peer-to-peer session may be thwarted by dropping the request to establish the session, the content of the peer-to-peer session may be intercepted at the access concentration point 18, or the peer-to-peer session may be established through a monitoring entity. As illustrated in FIG. 1, a reporting service 24 may be provided to which reporting messages are sent in association with detecting or controlling peer-to-peer communication sessions. Further, a proxy 26 is provided such that the peer-to-peer session can be established through the proxy 26 for monitoring.
In operation, the present invention will employ an inspection function in the access concentration point 18 to monitor packets being routed through the packet network 12. With reference to FIG. 2A, a technique for obtaining information relevant to peer-to-peer communication services is illustrated. In general, the access concentration points 18 will monitor packets to detect messages that are sent to or received from the peer-to-peer access service 22. These messages may be generally characterized to include access messages sent to and access reply messages received from the peer-to-peer access service 22. The access messages may be any type of message intended for the peer-to-peer access service 22, including login, registration, or other information query messages. Many of these messages will elicit a reply, which is generally referred to as an access reply message. The access concentration point 18 will store addresses associated with peer-to-peer access services 22 and recognize messages sent to these addresses and received from these addresses. Further, the access concentration point 18 will keep track of those communication clients 14 that communicate with the peer-to-peer access services 22.
As illustrated, when a local communication client 14 sends an access message toward a peer-to-peer access service 22, the access concentration point 18 will detect the message and allow the message to continue on to the peer-to-peer access service 22. When the peer-to-peer access service 22 generates an access reply message to the access message, the access reply message will traverse the access concentration point 18, which will analyze information in the access reply message and forward the access reply message on to the local communication client 14. The information analyzed in the access reply message may include the addresses for communication clients 14 with which peer-to-peer sessions may be established, as well as addresses for defined routing entities, such as the routing nodes 20 through which a peer-to-peer session may be directed by the peer-to-peer access service 22. The access message may also be analyzed to derive the addresses or other information relative to peer-to-peer communication sessions. The databases associated with tracking and controlling the peer-to-peer communication sessions may be updated in a continuous fashion based on analysis of the various access and access reply messages. By analyzing the correspondence between the local communication client 14 and the peer-to-peer access service 22, the access concentration point 18 will have sufficient information to detect an attempt to initiate a peer-to-peer session with a remote communication client 14.
Accordingly, the access concentration points 18 also monitor the packets from all communication clients 14 or select communication clients 14 that have been identified as those participating in peer-to-peer communication sessions or interacting with the peer-to-peer access service 22, to detect messages intended to establish peer-to-peer communication sessions. These messages are generally referred to as session initiation messages (SIMs), and may be detected as being any type of message involved in establishing a communication session from a communication client 14 to which or from which participation in peer-to-peer communication sessions is known or suspected, based on current or past information. Accordingly, the access concentration point 18 may detect a session initiation message from a local communication client 14 that is known to participate in peer-to-peer communication sessions; detect a session initiation message to a remote communication client 14 that is known to participate in peer-to-peer communication sessions; or detect information in the session initiation message indicating that a peer-to-peer communication session is being established through any means.
Once a session initiation message is detected, any number of actions may be taken alone or in combination. In a more basic embodiment, the session initiation messages associated with P2P communications are simply dropped, such that the intended communication session is prevented. In another embodiment, the identification of a session initiation message associated with P2P communications may dictate sending a notification to a reporting service 24 to record information pertaining to the attempt to establish a P2P communication session from the local communication client 14 to the remote communication client 14. When such session initiation messages are reported, the packet carrying the session initiation message may be dropped to prevent establishment of the P2P communication session, or the session initiation message may be forwarded in traditional fashion to allow the P2P communication session to be established. In yet another embodiment, the inspection function may take the necessary steps to have the P2P communication session routed through a monitoring function, which may be provided by a proxy 26. As such, the communication session may be established through the proxy 26, such that the content of the P2P communication session may be monitored with or without the knowledge of the local and remote communication clients 14 participating in the communication session.
FIGS. 2B-2D provide functional illustrations of how packets are inspected to identify session initiation messages associated with P2P communication sessions and the resulting processing once a SIM is identified. With reference to FIG. 2B, the access concentration point 18 is used to inspect all packets routed therethrough. A local communication client 14 initiates a P2P communication session by sending a SIM, such as a Session Initiation Protocol (SIP) Invite message, toward a remote communication client 14. Assuming the SIM is embodied in a packet routed through the access concentration point 18, the access concentration point 18 will identify the packet as being one representing a SIM associated with a P2P communication session. In this embodiment, the access concentration point 18 will simply drop the packet representing the SIM to prevent establishment of the desired P2P communication session between local and remote communication clients.
Turning now to FIG. 2C, when the access concentration point 18 identifies a packet representing a SIM associated with P2P communication session, a reporting message is sent to the reporting service 24 to provide the details associated with the SIM, and the SIM is forwarded toward remote communication client 14 such that the P2P communication session may be established and a session flow may take place between the local and remote communication clients 14. Accordingly, the access concentration point 18 may monitor each of the packets within the session flow, as well as the session control messages used to establish the P2P communication session. Those skilled in the art will recognize that additional control messages will be used to establish the P2P communication sessions in traditional fashion. Certain or all of these control messages may represent a session initiation message.
With reference to FIG. 2D, the access concentration point 18 is configured to identify a SIM associated with a P2P communication session, send a corresponding reporting message to the reporting service 24, and redirect the requested P2P communication session to be established through a proxy 26, which will act as a monitoring device for the session initiation messages, session traffic, or a combination thereof. As such, the SIM may be forwarded to the proxy 26, which will forward the SIM to the remote communication client 14, wherein a communication session is established through the proxy 26 and the access concentration point 18, such that the traffic creating the session flow in the communication session may be monitored. Those skilled in the art will recognize that the monitoring of the session traffic may take place at the proxy 26, access concentration point 18, or other monitoring entity through which the communication session is established. The proxy 26 may also act as a proxy in a traditional sense for handling session control messages. As such, the session control messages may be handled by the proxy 26, which will operate to establish the session between the local and remote communication clients 14 through an appropriate monitoring entity, which may be provided by the access concentration point 18.
In another embodiment, the criteria used to identify P2P access services 22 and participating communication clients 14 may be updated periodically as the criteria change, new P2P access services 22 and participating communication clients 14 are discovered, or old ones should be removed from being considered involved in P2P communication sessions. The updating process would be analogous to updates provided on a systematic basis for antivirus applications.
Turning now to FIG. 3, a more detailed communication flow is provided to illustrate exemplary operation of the present invention according to one embodiment. Initially, assume a remote communication client 14 associated with User B, desires to establish P2P communication sessions and wants to associate with the P2P access service 22 to facilitate such communication sessions. Initially, User B will interact with the remote communication client 14 to initiate access to the P2P access service 22 (step 100). An access message is sent to the P2P access service 22 to log into or otherwise register with the P2P access service 22, which keeps an updated list of active or available users (step 102). The P2P access service 22 will allow User B to log in or otherwise register, and will send an access reply message back to remote communication client 14 indicating that the login or registration process is complete (step 104). The access reply message may include addresses of various communication clients to which P2P communication sessions may be established, routing nodes 20, or other entities associated with supporting the P2P communication sessions.
Subsequently, a local communication client 14 will initiate interaction with the P2P access service 22 in response to instructions from User A (step 106). As such, the local communication client 14 will send an access message for login or registration purposes toward the P2P access service 22 (step 108). The access message is routed through the local communication client's access concentration point 18, wherein the associated packet or packets are monitored (step 110) and routed toward the P2P access service 22 (step 112). The P2P access service 22 will log in or otherwise register User A and the associated local communication client 14 and send an access reply message back toward remote communication client 14 (step 114). The access reply message is detected and monitored by the access concentration point 18 (step 116) and routed to the local communication client 14 (step 118). The access concentration point 18 may obtain addresses of various communication clients to which P2P communication sessions may be established, routing nodes 20, or other entities associated with supporting the P2P communication sessions.
At this point, the P2P access service 22 may operate in a fashion similar to a text messaging service by providing information alerting the active users of other active users when a new person becomes active or an active person becomes inactive. As such, the P2P access service 22 may send an update to the remote communication client 14 indicating that User A is available, and may also provide User A's address, which may be the IP address for the local communication client 14 (step 120). Similarly, the P2P access service 22 may send an update toward the local communication client 14 (step 122), wherein the update is monitored by the access concentration point 18 (step 124) and forwarded to the local communication client 14 (step 126). Notably, this address information may have already been known by the P2P access service 22 and detected by the access concentration point 18 on the access reply message sent to the remote communication client 14. At this point, User A is alerted that User B is active and available for communications, and User B is alerted that User A is active and available for communications. The respective local and remote communication clients 14 know each other's addresses.
Next, assume User A causes the local communication client 14 to initiate a P2P communication session with the remote communication client 14 of User B (step 128). As such, the local communication client 14 will send a SIM toward the remote communication client 14 (step 130). The SIM is represented by a packet routed through the access concentration point 18, which will monitor all of the packets routed therethrough and will detect the SIM from the local communication client 14 as being one associated with a P2P communication session, by analyzing the intended address (of the remote communication client 14) or other information indicative of a P2P communication session (step 132). The access concentration point 18 may forward the SIM to the remote communication client 14 (step 134), as well as send a reporting message to the reporting service 24 (step 136). The reporting message may identify the originating (local) and terminating (remote) communication clients 14, respectively, and any other information deemed appropriate for analyzing and reporting.
The remote communication client 14 will respond to the SIM by sending a session response toward local communication client 14 (step 138). The session response will pass through the access concentration point 18 where it is monitored (step 140), and is then forwarded to the local communication client 14 (step 142). At this point, a session is established between the local communication client 14 and the remote communication client 14 through the access concentration point 18, wherein the packets representing the information being transferred between local and remote communication clients 14 for the communication session are monitored ( steps 144, 146, and 148). Notably, the SIM will generally include the address of the originating local communication client 14 and any port and coding information for the communication session. Similarly, the session response may include the address of the terminating remote communication client 14 and any relevant port and coding information. As such, each of the local and remote communication clients 14 will have the necessary information to determine where and how to send packets to facilitate the P2P communication session. Those skilled in the art will recognize that the P2P communication session may be forced to be routed through select routing nodes 20. As such, the access concentration point 18 may be triggered by the address of the known nodes 20 for detecting and controlling P2P communication sessions. As noted, the address of these routing nodes 20 may be obtained from the communications between the communication clients 14 and the P2P access service 22 or communications with other communication clients.
Turning now to FIG. 4, a block representation of an access concentration point 18 is illustrated according to one embodiment of the present invention. The access concentration point 18 will include a control system 28 associated with an access network interface 30 and a core network interface 32. The access network interface 30 is the interface to which the various communication clients 14 are connected, directly or indirectly through corresponding access points 16. The core network interface 32 provides an interface to the packet network 12. In the illustrated embodiment, the control system 28 includes a network processor (NP) 34 associated with memory 36 and a central processor (CP) 38 associated with memory 40. The network processor 34 will provide the various packet processing functions, which include packet monitoring and message and information detection as described above. The central processor 38 will cooperate with the network processor 34 to provide the overall control of the access concentration point 18. Such control may include how to respond to the detection of interaction with the peer-to-peer access service 22 or an attempt to establish a peer-to-peer communication session. Those skilled in the art will recognize the general operation of the central processor 38 in relation to the network processor 34.
Those skilled in the art will recognize improvements and modifications to the preferred embodiments of the present invention. All such improvements and modifications are considered within the scope of the concepts disclosed herein and the claims that follow.

Claims (18)

1. A method comprising:
providing at least one access network interface;
providing at least one packet network interface;
monitoring packets being routed between the at least one access network interface and the at least one packet network interface;
identifying select ones of the packets representing access messages intended for a peer-to-peer access service; and
identifying select ones of the packets from the peer-to-peer access service representing access reply messages in response to the access messages.
2. The method of claim 1 further comprising:
identifying select ones of the packets representing session initiation messages for peer-to-peer communication sessions; and
processing the select ones of the packets representing session initiation messages according to defined criteria.
3. The method of claim 2 further comprising:
identifying addresses provided in the access reply messages; and
identifying the select ones of the packets representing session initiation messages for peer-to-peer communication sessions when the session initiation messages include the addresses.
4. The method of claim 3 wherein the addresses are used for routing packets associated with the peer-to-peer communication sessions.
5. The method of claim 4 wherein the addresses are associated with remote communication clients.
6. The method of claim 4 wherein the addresses are associated with routing nodes in a packet network.
7. The method of claim 2 wherein the defined criteria dictate that the select ones of the packets representing session initiation messages are dropped, and further comprising dropping the select ones of the packets representing session initiation messages.
8. The method of claim 2 wherein the defined criteria dictate that the select ones of the packets representing session initiation messages are routed toward their destination, and further comprising routing the select ones of the packets representing session initiation messages.
9. The method of claim 8 further comprising sending reporting messages to a reporting service when the select ones of the packets representing session initiation messages are identified.
10. The method of claim 2 further comprising sending reporting messages to a reporting service when the select ones of the packets representing session initiation messages are identified.
11. The method of claim 2 wherein the defined criteria dictate that the select ones of the packets representing session initiation messages are routed to a proxy for further processing, and further comprising routing the select ones of the packets representing session initiation messages to the proxy.
12. The method of claim 2 further comprising monitoring traffic in the peer-to-peer communication sessions associated with the session initiation messages.
13. The method of claim 2 wherein the session initiation messages are intended to initiate the peer-to-peer communication sessions between at least two communication clients over a packet network through which the packets are routed.
14. The method of claim 2 wherein the session initiation messages are session initiation protocol messages.
15. The method of claim 14 wherein the session initiation protocol messages are invite messages.
16. The method of claim 2 further comprising periodically receiving information and updating the defined criteria based on the information.
17. The method of claim 2 wherein the session initiation messages are configured to initiate the peer-to-peer communication sessions for voice communications.
18. The method of claim 2 wherein the session initiation messages are configured to initiate the peer-to-peer communication sessions for at least one of the group consisting of audio, video, and data communications.
US10/991,791 2004-11-18 2004-11-18 Identifying and controlling network sessions via an access concentration point Expired - Fee Related US8364807B1 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
US10/991,791 US8364807B1 (en) 2004-11-18 2004-11-18 Identifying and controlling network sessions via an access concentration point
US13/370,641 US8612587B1 (en) 2004-11-18 2012-02-10 Identifying and controlling network sessions via an access concentration point
US14/105,639 US20140108651A1 (en) 2004-11-18 2013-12-13 Identifying and controlling network sessions via an access concentration point

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US10/991,791 US8364807B1 (en) 2004-11-18 2004-11-18 Identifying and controlling network sessions via an access concentration point

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US13/370,641 Continuation US8612587B1 (en) 2004-11-18 2012-02-10 Identifying and controlling network sessions via an access concentration point

Publications (1)

Publication Number Publication Date
US8364807B1 true US8364807B1 (en) 2013-01-29

Family

ID=47562392

Family Applications (3)

Application Number Title Priority Date Filing Date
US10/991,791 Expired - Fee Related US8364807B1 (en) 2004-11-18 2004-11-18 Identifying and controlling network sessions via an access concentration point
US13/370,641 Expired - Fee Related US8612587B1 (en) 2004-11-18 2012-02-10 Identifying and controlling network sessions via an access concentration point
US14/105,639 Abandoned US20140108651A1 (en) 2004-11-18 2013-12-13 Identifying and controlling network sessions via an access concentration point

Family Applications After (2)

Application Number Title Priority Date Filing Date
US13/370,641 Expired - Fee Related US8612587B1 (en) 2004-11-18 2012-02-10 Identifying and controlling network sessions via an access concentration point
US14/105,639 Abandoned US20140108651A1 (en) 2004-11-18 2013-12-13 Identifying and controlling network sessions via an access concentration point

Country Status (1)

Country Link
US (3) US8364807B1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070076853A1 (en) * 2004-08-13 2007-04-05 Sipera Systems, Inc. System, method and apparatus for classifying communications in a communications system
US20080016515A1 (en) * 2006-07-12 2008-01-17 Sipera Systems, Inc. System, Method and Apparatus for Troubleshooting an IP Network
US20090094671A1 (en) * 2004-08-13 2009-04-09 Sipera Systems, Inc. System, Method and Apparatus for Providing Security in an IP-Based End User Device

Citations (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010021653A1 (en) 1999-12-07 2001-09-13 Chung-Seok Han Method of recovering dropped call in mobile communication system
US6349337B1 (en) 1997-11-14 2002-02-19 Microsoft Corporation Maintaining a first session on a first computing device and subsequently connecting to the first session via different computing devices and adapting the first session to conform to the different computing devices system configurations
US20020065080A1 (en) 2000-11-30 2002-05-30 Eshwar Pittampalli System and method for preventing dropped calls
US20020111158A1 (en) 2000-12-04 2002-08-15 Denso Corporation Method and apparatus for dynamically determining a mobile station's active set during a connection rescue procedure
US20020126626A1 (en) 2001-02-28 2002-09-12 The Trustees Of Columbia University In The City Of New York System and method for conferencing in inter/intranet telephony
US6539479B1 (en) 1997-07-15 2003-03-25 The Board Of Trustees Of The Leland Stanford Junior University System and method for securely logging onto a remotely located computer
US20030081582A1 (en) 2001-10-25 2003-05-01 Nikhil Jain Aggregating multiple wireless communication channels for high data rate transfers
US20030088698A1 (en) 2001-11-06 2003-05-08 Inderpreet Singh VPN failure recovery
US20030200298A1 (en) 2002-04-23 2003-10-23 Microsoft Corporation System for processing messages to support network telephony services
US20040028026A1 (en) 2002-08-07 2004-02-12 Cisco Technology, Inc. Providing telephony services using intelligent end points
US6732269B1 (en) 1999-10-01 2004-05-04 International Business Machines Corporation Methods, systems and computer program products for enhanced security identity utilizing an SSL proxy
US6735288B1 (en) 2000-01-07 2004-05-11 Cisco Technology, Inc. Voice over IP voice mail system configured for placing an outgoing call and returning subscriber to mailbox after call completion
US20040139209A1 (en) 2003-01-09 2004-07-15 Mussman Harry Edward Routing calls through a network
US20040165587A1 (en) 2002-10-23 2004-08-26 Satoshi Kiyoto Policy settable peer-to-peer session apparatus
US20050091407A1 (en) 2003-10-23 2005-04-28 Tivox Systems, Inc Multi-network exchange system for telephony applications
US6937597B1 (en) 1999-02-26 2005-08-30 Lucent Technologies Inc. Signaling method for internet telephony
US6971017B2 (en) 2002-04-16 2005-11-29 Xerox Corporation Ad hoc secure access to documents and services
US7020084B1 (en) 2000-04-25 2006-03-28 Hitachi, Ltd. Communication system, a communication method and communication terminal
US20060072451A1 (en) 2004-09-27 2006-04-06 Ross Alan D Role-based network traffic-flow rate control
US20060168304A1 (en) * 2002-11-15 2006-07-27 Bauer Daniel N Network traffic control in peer-to-peer environments
US7100200B2 (en) 2001-06-13 2006-08-29 Citrix Systems, Inc. Method and apparatus for transmitting authentication credentials of a user across communication sessions
US20060251000A1 (en) * 2002-10-01 2006-11-09 Williams Andrew G Arrangement and method for session control in wireless communication network
US7225226B2 (en) 2002-09-27 2007-05-29 International Business Machines Corporation Chat messaging channel redirection
US7249377B1 (en) 1999-03-31 2007-07-24 International Business Machines Corporation Method for client delegation of security to a proxy
US20070214083A1 (en) 2000-11-08 2007-09-13 Sprint Spectrum L.P. Method and system for providing prepaid data service
US7289429B2 (en) 2001-06-01 2007-10-30 Fujitsu Network Communications, Inc. System and method to perform non-service effecting bandwidth reservation using a reservation signaling protocol
US7296205B2 (en) 2004-02-18 2007-11-13 Nokia Corporation Data repair
US7299047B2 (en) 2003-08-19 2007-11-20 Lucent Technologies Inc. Wireless communication system enhanced call recovery
US7778194B1 (en) 2004-08-13 2010-08-17 Packeteer, Inc. Examination of connection handshake to enhance classification of encrypted network traffic

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7664048B1 (en) * 2003-11-24 2010-02-16 Packeteer, Inc. Heuristic behavior pattern matching of data flows in enhanced network traffic classification

Patent Citations (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6539479B1 (en) 1997-07-15 2003-03-25 The Board Of Trustees Of The Leland Stanford Junior University System and method for securely logging onto a remotely located computer
US6349337B1 (en) 1997-11-14 2002-02-19 Microsoft Corporation Maintaining a first session on a first computing device and subsequently connecting to the first session via different computing devices and adapting the first session to conform to the different computing devices system configurations
US6937597B1 (en) 1999-02-26 2005-08-30 Lucent Technologies Inc. Signaling method for internet telephony
US7249377B1 (en) 1999-03-31 2007-07-24 International Business Machines Corporation Method for client delegation of security to a proxy
US6732269B1 (en) 1999-10-01 2004-05-04 International Business Machines Corporation Methods, systems and computer program products for enhanced security identity utilizing an SSL proxy
US20010021653A1 (en) 1999-12-07 2001-09-13 Chung-Seok Han Method of recovering dropped call in mobile communication system
US6735288B1 (en) 2000-01-07 2004-05-11 Cisco Technology, Inc. Voice over IP voice mail system configured for placing an outgoing call and returning subscriber to mailbox after call completion
US7020084B1 (en) 2000-04-25 2006-03-28 Hitachi, Ltd. Communication system, a communication method and communication terminal
US20070214083A1 (en) 2000-11-08 2007-09-13 Sprint Spectrum L.P. Method and system for providing prepaid data service
US20020065080A1 (en) 2000-11-30 2002-05-30 Eshwar Pittampalli System and method for preventing dropped calls
US20020111158A1 (en) 2000-12-04 2002-08-15 Denso Corporation Method and apparatus for dynamically determining a mobile station's active set during a connection rescue procedure
US20020126626A1 (en) 2001-02-28 2002-09-12 The Trustees Of Columbia University In The City Of New York System and method for conferencing in inter/intranet telephony
US7289429B2 (en) 2001-06-01 2007-10-30 Fujitsu Network Communications, Inc. System and method to perform non-service effecting bandwidth reservation using a reservation signaling protocol
US7100200B2 (en) 2001-06-13 2006-08-29 Citrix Systems, Inc. Method and apparatus for transmitting authentication credentials of a user across communication sessions
US20030081582A1 (en) 2001-10-25 2003-05-01 Nikhil Jain Aggregating multiple wireless communication channels for high data rate transfers
US20030088698A1 (en) 2001-11-06 2003-05-08 Inderpreet Singh VPN failure recovery
US6971017B2 (en) 2002-04-16 2005-11-29 Xerox Corporation Ad hoc secure access to documents and services
US20030200298A1 (en) 2002-04-23 2003-10-23 Microsoft Corporation System for processing messages to support network telephony services
US20040028026A1 (en) 2002-08-07 2004-02-12 Cisco Technology, Inc. Providing telephony services using intelligent end points
US7225226B2 (en) 2002-09-27 2007-05-29 International Business Machines Corporation Chat messaging channel redirection
US20060251000A1 (en) * 2002-10-01 2006-11-09 Williams Andrew G Arrangement and method for session control in wireless communication network
US20040165587A1 (en) 2002-10-23 2004-08-26 Satoshi Kiyoto Policy settable peer-to-peer session apparatus
US20060168304A1 (en) * 2002-11-15 2006-07-27 Bauer Daniel N Network traffic control in peer-to-peer environments
US20040139209A1 (en) 2003-01-09 2004-07-15 Mussman Harry Edward Routing calls through a network
US7299047B2 (en) 2003-08-19 2007-11-20 Lucent Technologies Inc. Wireless communication system enhanced call recovery
US20050091407A1 (en) 2003-10-23 2005-04-28 Tivox Systems, Inc Multi-network exchange system for telephony applications
US7296205B2 (en) 2004-02-18 2007-11-13 Nokia Corporation Data repair
US7778194B1 (en) 2004-08-13 2010-08-17 Packeteer, Inc. Examination of connection handshake to enhance classification of encrypted network traffic
US20060072451A1 (en) 2004-09-27 2006-04-06 Ross Alan D Role-based network traffic-flow rate control

Non-Patent Citations (9)

* Cited by examiner, † Cited by third party
Title
Advisory Action for U.S. Appl. No. 11/053,044 mailed Apr. 20, 2009, 3 pages.
Examiner's Answer to Appeal Brief for U.S. Appl. No. 11/053,044 mailed Feb. 1, 2011, 42 pages.
Final Office Action for U.S. Appl. No. 11/053,044 mailed Jan. 8, 2009, 33 pages.
Final Office Action for U.S. Appl. No. 11/053,044 mailed Mar. 1, 2010, 35 pages.
Final Office Action for U.S. Appl. No. 13/370,641 mailed Sep. 13, 2012, 24 pages.
Non-final Office Action for U.S. Appl. No. 11/053,044 mailed Aug. 5, 2009, 34 pages.
Non-final Office Action for U.S. Appl. No. 11/053,044 mailed May 28, 2008, 33 pages.
Office Action mailed May 14, 2012, issued by the Patent Office during prosecution of U.S. Appl. No. 13/370,641. 23 pages.
Schulzrinne, H.; Rosenberg, J., "The Session Initiation Protocol: Internet-centric signaling," Communications Magazine, IEEE , vol. 38, No. 10, pp. 134-141, Oct. 2000. *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070076853A1 (en) * 2004-08-13 2007-04-05 Sipera Systems, Inc. System, method and apparatus for classifying communications in a communications system
US20090094671A1 (en) * 2004-08-13 2009-04-09 Sipera Systems, Inc. System, Method and Apparatus for Providing Security in an IP-Based End User Device
US9531873B2 (en) 2004-08-13 2016-12-27 Avaya Inc. System, method and apparatus for classifying communications in a communications system
US20080016515A1 (en) * 2006-07-12 2008-01-17 Sipera Systems, Inc. System, Method and Apparatus for Troubleshooting an IP Network
US8862718B2 (en) 2006-07-12 2014-10-14 Avaya Inc. System, method and apparatus for troubleshooting an IP network
US9577895B2 (en) 2006-07-12 2017-02-21 Avaya Inc. System, method and apparatus for troubleshooting an IP network

Also Published As

Publication number Publication date
US8612587B1 (en) 2013-12-17
US20140108651A1 (en) 2014-04-17

Similar Documents

Publication Publication Date Title
US8102879B2 (en) Application layer metrics monitoring
US7764699B2 (en) Method and system using shared configuration information to manage network access for network users
US20080126541A1 (en) System and Method for Providing Multimedia Services
US8015403B2 (en) Method and system indicating a level of security for VoIP calls through presence
US8265250B2 (en) Registration of multiple VoIP devices
US8079062B2 (en) Method and system using presence information to manage network access
US20130287029A1 (en) Preventing illicit communications
US8315245B2 (en) Overload call control in a VoIP network
Molnár et al. On the identification and analysis of Skype traffic
US8433795B2 (en) Selective user notification based on IP flow information
US20220086691A1 (en) User Data Traffic Handling
JP2011530910A (en) Attack detection support method in distributed system
JP2008538470A (en) How to counter the transmission of unsolicited voice information
JP2015535669A (en) Monitoring encrypted sessions
US20080118043A1 (en) Call Control Apparatus and Method for Controlling Call Control Apparatus
JP5114565B2 (en) Method for detecting attack on multimedia system and multimedia system having attack detection function
US8612587B1 (en) Identifying and controlling network sessions via an access concentration point
US7602762B1 (en) System and method for determining when a CSCF should act like I-CSCF or like S-CSCF
US10735474B2 (en) Voice call controller
Leung et al. Network forensic on encrypted peer-to-peer voip traffics and the detection, blocking, and prioritization of skype traffics
JP2007311872A (en) Call control server and its method
US9015309B2 (en) Networked probe system
US8280961B2 (en) Method and system for providing a camp-on service for a network service
CN110933051B (en) Intercommunication method between SIP signaling services
EP1882341B1 (en) Management network access for network users

Legal Events

Date Code Title Description
AS Assignment

Owner name: NORTEL NETWORKS LIMITED, CANADA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:LEWIS, LARRY DEWAYNE;REEL/FRAME:016012/0528

Effective date: 20041022

AS Assignment

Owner name: ROCKSTAR BIDCO, LP, NEW YORK

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:NORTEL NETWORKS LIMITED;REEL/FRAME:027143/0717

Effective date: 20110729

AS Assignment

Owner name: ROCKSTAR CONSORTIUM US LP, TEXAS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ROCKSTAR BIDCO, LP;REEL/FRAME:029496/0948

Effective date: 20120509

AS Assignment

Owner name: RPX CLEARINGHOUSE LLC, CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:ROCKSTAR CONSORTIUM US LP;ROCKSTAR CONSORTIUM LLC;BOCKSTAR TECHNOLOGIES LLC;AND OTHERS;REEL/FRAME:034924/0779

Effective date: 20150128

AS Assignment

Owner name: JPMORGAN CHASE BANK, N.A., AS COLLATERAL AGENT, IL

Free format text: SECURITY AGREEMENT;ASSIGNORS:RPX CORPORATION;RPX CLEARINGHOUSE LLC;REEL/FRAME:038041/0001

Effective date: 20160226

REMI Maintenance fee reminder mailed
LAPS Lapse for failure to pay maintenance fees
STCH Information on status: patent discontinuation

Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FP Lapsed due to failure to pay maintenance fee

Effective date: 20170129

AS Assignment

Owner name: RPX CLEARINGHOUSE LLC, CALIFORNIA

Free format text: RELEASE (REEL 038041 / FRAME 0001);ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:044970/0030

Effective date: 20171222

Owner name: RPX CORPORATION, CALIFORNIA

Free format text: RELEASE (REEL 038041 / FRAME 0001);ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:044970/0030

Effective date: 20171222